Login / Signup
A Guided Approach to Behavioral Authentication.
Yeeun Ku
Leo Hyun Park
Sooyeon Shin
Taekyoung Kwon
Published in:
CCS (2018)
Keyphrases
</>
identity authentication
authentication protocol
biometric authentication
user authentication
lightweight
authentication scheme
peer to peer
smart card
security requirements
image authentication
human decision making
behavioral data
encryption decryption
authentication mechanism